Regulatory and Policy Compliance with Regard to Identity Theft Prevention, Detection, and Response

Regulatory and Policy Compliance with Regard to Identity Theft Prevention, Detection, and Response

Guillermo A. Francia, Frances Shannon Hutchinson
DOI: 10.4018/978-1-4666-4707-7.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The proliferation of the Internet has intensified the identity theft crisis. Recent surveys indicate staggering losses amounting to almost $50 billion incurred due to almost 9 million cases of identity theft losses. These startling and apparently persistent statistics have prompted the United States and other foreign governments to initiate strategic plans and to enact several regulations in order to curb the crisis. This chapter surveys national and international laws pertaining to identity theft. Further, it discusses regulatory and policy compliance in the field of information security as it relates to identity theft prevention, detection, and response policies or procedures. In order to comply with recently enacted security-focused legislations and to protect the private information of customers or other third-party members, it is important that institutions of all types establish appropriate policies and procedures for dealing with sensitive information.
Chapter Preview
Top

Background

Identity theft is a threat that has confounded society since the biblical times. The ubiquity of the Internet and the convenience of electronic transactions have exacerbated the threat and made it even much easier to execute. Recent surveys indicate staggering losses amounting to almost $50 billion incurred due to almost 9 million cases of identity theft losses. A snapshot of several alarming statistics, which are gathered from the Open Security Foundation’s DataLossDB (DataLossDB, 2011), pertinent to identity theft is shown in Figures 1 and 2. Figure 1 depicts the frequency of ID theft occurrences each year. As of February, 2011, there are already 10 incidents that involved ID theft.

Figure 1.

Annual ID theft incidents

978-1-4666-4707-7.ch012.f01
Figure 2.

Personal identifiable information data loss by type in 2010

978-1-4666-4707-7.ch012.f02

Figure 2 shows the Personal Identifiable Information (PII) data loss categorized by data type in 2010. The data types are Date of Birth (DOB), Credit Card Number (CCN), Medical/Health information (MED), Social Security Number (SSN), Name and Address (NAA), and other miscellaneous information (MISC).

These startling statistics and their perceived persistent nature have prompted the federal government to initiate a strategic plan and several regulations to curb the crisis. We begin with the definition of important concepts pertaining to regulatory compliance and identity theft.

Definitions

  • Regulatory Compliance: A goal set by an organization in its attempt to comply with all laws or regulations relevant to that organization.

  • Policy Compliance: A goal set by an organization in its attempt to encourage and achieve compliance by its members/employees with regard to the organization’s policies

  • Personally Identifiable Information: Any personal information by which an individual may be identified (SSN, bank account number, username/password combination, etc.).

  • Identity Theft: The co-option of another person’s personal information without that person’s knowledge and the fraudulent use of such knowledge (Princeton University, 2010)

Complete Chapter List

Search this Book:
Reset